Identifying and Reverse engineering Linked List constructs